IBM Goes After Apache’s Tomcat
Java Developers looking for a mobile-friendly platform could be happy with the next release of IBM’s Websphere Application Server, which is aimed at offering a lighter, more dynamic version of the app middleware.
Shown off at the IBM Impact show in Las Vegas on Tuesday, Websphere Application Server 8.5, codenamed Liberty, has a footprint of just 50MB. This makes it small enough to run on machines such as the Raspberry Pi, according to Marie Wieck, GM for IBM Application and Infrastructure Middleware.
Updates and bug fixes can also be done on the fly with no need to take down the server, she added.
The Liberty release will be launched this quarter, and already has 6,000 beta users, according to Wieck.
John Rymer of Forrester said that the compact and dynamic nature of the new version of Websphere Application Server could make it a tempting proposition for Java developers.
“If you want to install version seven or eight, it’s a big piece of software requiring a lot of space and memory. The installation and configuration is also tricky,” he explained.
“Java developers working in the cloud and on mobile were moving towards something like Apache Tomcat. It’s very light, starts up quickly and you can add applications without having to take the system down. IBM didn’t have anything to respond to that, and that’s what Liberty is.”
For firms needing to update applications three times a year, for example, the dynamic capability of Liberty will make it a much easier process.
“If developers want to run Java on a mobile device, this is good,” Rymer added.
The new features are also backwards compatible, meaning current Websphere users will be able to take advantage of the improvements.
However, IBM could still have difficulty competing in the app server space on a standalone basis, according to Rymer.
Intel’s Itanium Processor Available Until 2022
Comments Off on Intel’s Itanium Processor Available Until 2022
HP will have access to Intel’s Itanium processor until 2022, according to Intel’s Kirk Skaugen.
Skaugen, who used to be VP of Intel’s Datacentre and Connected Systems Group, testified under oath during the HP versus Oracle lawsuit that HP and Intel had an arrangement that “enabled HP to have access to the Itanium microprocessor through 2022, and that HP could extend even longer”. Skaugen’s testimony was submitted as part of court documents filed on 23 April and gives some indication of how long both HP and Intel were expecting to push Itanium.
Oracle, which has been involved in an increasingly bitter spat with HP over Itanium and the hiring of its current co-president and former HP CEO Mark Hurd, claims Intel’s Itanium was on its way out, alleging that HP mislead it and customers, leading to its decision to drop support for the IA64 architecture.
However, according to HP, “Oracle resorts to mischaracterising HP’s statements, taking them out of appropriate context, or misstating the relevant timeline.”
HP claims Skaugen’s comments show that when HP said Itanium had a long future it wasn’t lying. “By any measure, all of HP’s statements regarding the length of its roadmap and the future of the Itanium microprocessor were true,” HP said in documents filed with the court.
Skaugen’s comments are something of a surprise, not because they show an agreement between HP and Intel – HP already admitted that one existed – but the length of Intel’s commitment to HP on Itanium and the fact that HP could extend it.
HP’s language suggests that it, as the customer, had the upper hand in the contract with Intel, with the firm saying, “Intel was committed by contract to continue producing Itanium microprocessors”. Skaugen’s testimony in court supports HP’s claim.
AMD Shows Off New Radeon Chips
AMD has now officially updated its HD 7000M lineup of mobile GPUs with HD 7700M, HD 7800M and HD 7900M GPUs that are all based on AMD’s 28nm GCN architecture. The first in line that should show up in notebooks is the flagship HD 7970M GPU.
As noted, the entire lineup is based on AMD’s 28nm GCN architecture, but as always, the naming scheme of the AMD mobile parts has nothing to do with the desktop ones. The HD 7900M, codename Wimbledon, is actually based on 28nm Pitcairn destkop GPU that features 1280 stream processors, 80 texture units, 32 ROPs and up to 2GB of GDDR5 memory paired up with a 256-bit memory interface.
The HD 7800M series, codename Heathrow and the Radeon HD 7700M series, codename Chelsea, are both based on Cape Verde desktop GPU but with a slight twist. While Heathrow, HD 7800M series features fully enabled Cape Verde GPU with 640 stream processors, 40 texture units and 16 ROPs, the Chelsea HD 7700M series is based on a “crippled” Cape Verde core with 512 stream processors and 32 texture units. Both the HD 7800M series and the HD 7700M series will feature up to 2GB of GDDR5 memory paired up with a 128-bit memory interface. Of course, we expect at least two SKUs for both HD 7700M and HD 7800M series.
AMD also decided to ditch the PCI-Express 3.0 support on the HD 7700M series mainly as this one is aimed at lower-performance platforms that are all about power saving, and performance gain was simply too low.
For now, AMD has only shed precise details regarding the HD 7970M GPU that is based on the fully enabled Pitcairn GPU with 1280 stream processors that will end up clocked at 850MHz for the GPU and 4.8GHz for 2GB of GDDR5 memory paired up with a 256-bit memory interface.
As you can notice, the HD 7970M has lower GPU clocks than its HD 7870 desktop counterpart, but AMD also decided to keep the memory at the same level resulting in 153.6GB/s of memory bandwidth. According to AMD slides, HD 7970M should end up to be anywhere between 30 and 60% faster than HD 6990M and anywhere between 16 and 76 percent when compared to Nvidia current high-end GTX 675M GPU.
Is A Cyber Warfare On The Horizon?
F-secure’s chief security researcher, Mikko Hypponen, has warned that we are entering into a cyber warfare revolution, and that governments will soon attempt to outdo each other based on their computer weapons’ prowess.
The internet security expert said-any future crisis between technically advanced nations will involve cyber elements.
His comments came after hearing last week that China and the US have been engaging in “war games” simulations.
“I wasn’t expecting [war games] so soon,” Hypponen said.
“I’m surprised and I think it is a good move because everybody is worried about escalation. The way to fight unnecessary escalations is that you know more about how the perceived enemy would act if there would be an escalation. War games are exactly that.”
It was Hypponen’s observations on the war games which led him to remark that we must look at “the bigger picture”.
“We’ve seen a revolution in defence technology and in technology generally over the past 60 to 70 years and I believe we are right now seeing the beginning of the next revolution: a cyber warfare revolution, which is going to as big as the revolutions we’ve seen so far in technology becoming part of defence, and part of wars,” he added.
Hypponen also predicted that it won’t be long before the world sees its first cyber arms race, including cyber war rehearsals to prove how strong countries are and boasting about their cyber skills to make other countries pay attention.
“Like nuclear in the sixties, cyber attacks are a deterrent and deterrents only work if your perceived enemies know that you have it,” he said.
Privacy Advocates & Lawmakers Push For Google Probe
Comments Off on Privacy Advocates & Lawmakers Push For Google Probe
Privacy groups and lawmakers are pushing for a new and more expansive investigation into Google and its privacy practices after the U.S. Federal Communications Commission announced that it found no evidence that the company violated eavesdropping laws.
Late last week, the FCC reported that there was no legal precedent to find fault with Google collecting unprotected home Wi-Fi data, such as personal email, passwords and search histories, with its roaming Street View cars between 2007 and 2010.
However, the FCC did fine Google $25,000 for obstructing its investigation.
A Google spokesperson took issue with the fine.
“We disagree with the FCC’s characterization of our cooperation in their investigation and will be filing a response,” said the spokesperson in an email to Computerworld. “It was a mistake for us to include code in our software that collected payload data, but we believe we did nothing illegal. We have worked with the relevant authorities to answer their questions and concerns.”
The Electronic Privacy Information Center (EPIC), a national privacy watchdog, disagreed with the FCC findings.
In a letter sent to U.S. Attorney General Eric Holder today, EPIC asked that the Department of Justice investigate Google’s surreptitious collecting of Wi-Fi data from residential networks.
“Given the inadequacy of the FCC’s investigation and the law enforcement responsibilities of the attorney general, EPIC urges the Department of Justice to investigate Google’s collection of Wi-Fi data from residential Wi-Fi networks,” wrote Mark Rotenberg, executive director of the advocacy group.
“By the [FCC’s] own admission, the investigation conducted was inadequate and did not address the applicability of federal wiretap law to Google’s interception of emails, usernames, passwords, browsing histories and other personal information,” Rotenberg added.
Rackspace Goes Openstack
Rackspace has finally deployed an Openstack based cloud, playing down claims that it benefits the most from the alliance.
Rackspace is one of the leaders of the Openstack alliance, an open source cloud initiative that aims to break Amazon’s stranglehold on the industry by offering open application programmable interfaces (APIs). Until now Openstack has largely been all talk, but Rackspace has deployed a production Openstack cloud that the firm claims will help it sell Openstack to the enterprise.
Fabio Torlini, VP of cloud at Rackspace said the firm has been “going flat out to make the code production ready”. Torlini said Rackspace’s decision to deploy an Openstack based cloud could be a tipping point in deployment. “It’s going to be the catalyst for many other companies deploying Openstack,” said Torlini.
Rackspace has been the largest contributor to Openstack and the fact that it has the first major Openstack deployment support claims that Rackspace is getting the most out of Openstack.
However Torlini said, “For us, we’re able to be the first one to launch a large scale Openstack compute platform because, yes, we are one of the main providers of the original code and we are a founder of Openstack, so we have tried to develop Openstack as a neutral foundation and it is a foundation to provide a service to all its members. But we’re lucky enough to be one of the founder members, to be able to drive it, and get there [deployment] first.”
Torlini defended Rackspace’s role in the Openstack alliance, claiming the strong leadership shown by the firm is good for the community. Torlini said, “Openstack is beneficial to the product itself but that’s the whole point. The whole idea of many more providers going onto Openstack helping develop the Openstack cloud, helping advance the actual products and code is the whole point of Openstack. On the counter side of that argument is if it’s beneficial for us it is just as beneficial for any other member of Openstack because they have access to the same code and they are able to provide.”
Torlini admitted that Openstack and the community is an advantage for the firm but claimed it wasn’t possible for Rackspace to dominate. “You have companies in Openstack that are far larger than Rackspace enabled to put much more resources into Openstack as well, it’s impossible for us to dominate Openstack – it’s an independent foundation. Is it advantageous from a product perspective? I should damn well hope so,” said Torlini.
More Trojan Malware Found On Macs
Following the outbreak of the Flashback Mac Trojan, security researchers have identified two more cases of Mac OS X malware. The good news is most Mac owners have little reason to worry about them.
Both cases are variants on the same Trojan, called SabPub, Kaspersky Lab Expert Costin Raiu wrote on Securelist.
The first variant is known as Backdoor.OSX.SabPub.a. Like Flashback, this new threat was likely spread through Java exploits on Websites, and allows for remote control of affected systems. It was created roughly one month ago.
Fortunately, this malware isn’t a threat to most users for a few reasons: It may have only been used in targeted attacks, Raiu wrote, with links to malicious Websites sent via e-mail, and the domain used to fetch instructions for infected Macs has since been shut down.
Furthermore, Apple’s security update for Flashback helps render future Java-based attacks harmless. In addition to removing the Flashback malware, the update automatically deactivates the Java browser plug-in and Java Web Start if they remain unused for 35 days. Users must then manually re-enable Java when they encounter applets on a Web page or a Web Start application.
The second SabPub variant is old-school compared to its sibling. Instead of attacking through malicious Websites, it uses infected Microsoft Word documents as vector, distributed by e-mail.
Intel Goes ALL-IN On Windows 8 Tablets
Comments Off on Intel Goes ALL-IN On Windows 8 Tablets
It appears that is working on a new type of NAND storage, offering higher data density and lower costs. The company believes the new triple-level cell ships are ideally suited for tablets and ultrabooks.
Samsung claims it is the first chipmaker to embrace triple-level cell (TLC) technology, but other companies are expected to follow suit. Unlike single-level cell (SLC) or multilevel cell (MLC), the new tech can store three bits per cell, greatly increasing density. The obvious offshoot is lower production cost, as TLC basically allows for more bits per wafer.
However, TLC also has some drawbacks. Due to its design, it is more prone to errors, less reliable and it is also slower than MLC. However, it still ends up significantly faster than hard drives and reliability issues can be worked out with a bit more digital signal processing.
Maryland Bill To Ban Employers From Facebook Snooping
Comments Off on Maryland Bill To Ban Employers From Facebook Snooping
The practice of employers requesting job applicants to provide their account login information for Facebook and other social media sites will soon be a think of the past, as Maryland is poised to be among the first states to ban the practice. The state’s General Assembly has passed the bill, which now awaits the signature of Gov. Martin O’Malley, reports The Baltimore Sun.
O’Malley is expected to sign the bill into law, reports The Gazette.
Melissa Goemann, who directs the American Civil Liberties Union’s legislative efforts in Maryland, tells the Sun, “this is a really positive development, because the technology for social media is expanding every year, and we think this sets a really good precedent for limiting how much your privacy can be exposed when you use these mediums.”
Goemann says the ACLU took up the case of Maryland Corrections Officer Robert Collins, who had been asked to give his Facebook login and password to Corrections officials during a recertification interview.
As news spread of similar cases, legislators at the state and federal level vowed to take action and ban the practice, on the grounds that it is an unreasonable invasion of a job-seeker’s privacy. Sens. Chuck Schumer and Richard Blumenthal say they asked the U.S. Justice Department to investigate whether the practice is illegal.
Are Medical Implants Vulnerable To Hackers?
April 16, 2012 by admin
Filed under Around The Net
Comments Off on Are Medical Implants Vulnerable To Hackers?
Security experts have warned that many medical implants are vulnerable to cyber attacks that could endanger their users’ lives. While an increasing number of patients are being fitted with devices such as pacemakers and insulin pumps to manage chronic conditions apparently the inventors did not think anyone would be evil enough to try and hack them.
For some reason they installed unprotected wireless links so that they could be updated easily. Therefore this means that hackers could gain remote control of such implants because they rely on unprotected wireless links to update them. After gaining access to the device, a cyber criminal could then switch it off or tell it to deliver a dangerous dose of medicine to the patient.